It Operation

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 15 Experts worldwide ranked by ideXlab platform

Lela Nurpulaela - One of the best experts on this subject based on the ideXlab platform.

  • Evaluation of It governance to support It Operation excellent based on COBIt 4.1 at the PT Timah Tbk
    2016 3rd International Conference on Information Technology Computer and Electrical Engineering (ICITACEE), 2016
    Co-Authors: Lela Nurpulaela
    Abstract:

    Role of Information Technology (It) in the company become a necessIty that can not be avoided even become major tools or enabler in the management of business functions. Increased investment and It implementation let followed by increasing the benefIts provided. It is necessary for evaluation and control of the It implemented so in line wIth expectations. One way is to apply the control of It It Governance (It Governance). It governance is intended to ensure the application of It are held in harmony and support the achievement of business objectives. This study aimed to evaluate the level of It maturIty using COBIt 4.1. The results of the study measuring the maturIty level of It governance as a whole is currently obtained value of 2.88 (Defined). While the value of the PO maturIty based domain-level values of 3.09 (Defined), AI domain is worth 2.67 (Defined), and domain DS-value of 2.78 (Defined) and ME domain is worth 3.08 (Defined). While the value of It governance maturIty expected overall reached a value of at least 3.27 (Defined). While the maturIty of the targeted domain PO appreciating 3.50 (Defined), AI domain is worth 3.14 (Defined), and domain DS-value of 3.14 (Defined) and ME domain is worth 3.40 (Defined). To meet the target level of maturIty (gap) on the expected forward at PO domain necessary corrective action, especially PO2, PO5 and PO6.

Nijaz Bajgoric - One of the best experts on this subject based on the ideXlab platform.

  • System administration for business continuIty – the case of HP-UX operating system
    International Journal of Business Continuity and Risk Management, 2012
    Co-Authors: Nijaz Bajgoric
    Abstract:

    The paper explores the roles of system administration as an It-Operation and system administrator as an It-specialist from business continuIty perspective. It aims at identifying the most crItical system administrator's activIties and server operating system's features for achieving high availabilIty ratios and hence enhancing business continuIty. HP's HP-UX as a server operating system is selected as a case. A thorough list of main system administration commands, tools, techniques and technologies on the HP-UX operating platform that are crucial for enhancing business continuIty are identified. The paper is presented in a form of case study combined wIth the systems approach in exploring modern server operating environments, system administration, availabilIty and business continuIty. The paper can be used to identify a framework for defining addItional skills of system administrators and necessary features of server operating environment wIthin the efforts of enhancing high availabilIty ratios and business continuIty.

Frédéric Giroire - One of the best experts on this subject based on the ideXlab platform.

  • Impact of It Monoculture on Behavioral End Host Intrusion Detection
    2009
    Co-Authors: Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Lim Huang, Frédéric Giroire
    Abstract:

    In this paper, we study the impact of today's It policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to the uniform configuration of Host intrusion detection systems (HIDS) across all hosts in an enterprise networks. We assess the performance impact this policy has from the individual's point of view by analyzing network traces collected from 350 enterprise users. We uncover a great deal of diversIty in the user population in terms of the “tail†behavior, i.e., the component which matters for anomaly detection systems. We demonstrate that the monoculture approach to HIDS configuration results in users that experience wildly different false posItive and false negatives rates. We then introduce new policies, based upon leveraging this diversIty and show that not only do they dramatically improve performance for the vast majorIty of users, but they also reduce the number of false posItives arriving in centralized It Operation centers, and can reduce attack strength.

Dhiman Barman - One of the best experts on this subject based on the ideXlab platform.

  • Impact of It Monoculture on Behavioral End Host Intrusion Detection
    2009
    Co-Authors: Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Lim Huang, Frédéric Giroire
    Abstract:

    In this paper, we study the impact of today's It policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to the uniform configuration of Host intrusion detection systems (HIDS) across all hosts in an enterprise networks. We assess the performance impact this policy has from the individual's point of view by analyzing network traces collected from 350 enterprise users. We uncover a great deal of diversIty in the user population in terms of the “tail†behavior, i.e., the component which matters for anomaly detection systems. We demonstrate that the monoculture approach to HIDS configuration results in users that experience wildly different false posItive and false negatives rates. We then introduce new policies, based upon leveraging this diversIty and show that not only do they dramatically improve performance for the vast majorIty of users, but they also reduce the number of false posItives arriving in centralized It Operation centers, and can reduce attack strength.

Jaideep Chandrashekar - One of the best experts on this subject based on the ideXlab platform.

  • Impact of It Monoculture on Behavioral End Host Intrusion Detection
    2009
    Co-Authors: Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Lim Huang, Frédéric Giroire
    Abstract:

    In this paper, we study the impact of today's It policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to the uniform configuration of Host intrusion detection systems (HIDS) across all hosts in an enterprise networks. We assess the performance impact this policy has from the individual's point of view by analyzing network traces collected from 350 enterprise users. We uncover a great deal of diversIty in the user population in terms of the “tail†behavior, i.e., the component which matters for anomaly detection systems. We demonstrate that the monoculture approach to HIDS configuration results in users that experience wildly different false posItive and false negatives rates. We then introduce new policies, based upon leveraging this diversIty and show that not only do they dramatically improve performance for the vast majorIty of users, but they also reduce the number of false posItives arriving in centralized It Operation centers, and can reduce attack strength.